[Free] 2018(June) Dumps4cert Microsoft 70-342 Dumps with VCE and PDF Download 121-130

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May Microsoft Official New Released 70-342
100% Free Download! 100% Pass Guaranteed!

Advanced Solutions of Microsoft Exchange Server 2013

Question No: 121 – (Topic 6)

You have an Exchange Server 2013 organization named contoso.com. A partner company has an Exchange Server 2010 Service Pack 2 (SP2) organization named fabrikam.com.

Both organizations have a federated trust.

In contoso.com, you run Get-FederationInformation -DomainName contoso.com and you discover that the TokenIssueURIs property has a value of

lt;uri:federation:MicrosoftOnlinegt;.

In fabrikam.com, you run Get-FederationInformation -DomainName fabrikam.com and you discover that the TokenIssueURIs property has a value of lt;uri:WindowsLiveIDgt;.

What should you do?

  1. In contoso.com, install the Exchange Web Service (EWS) Managed API.

  2. In the contoso.com, run the Set-OrganizationConfig cmdlet.

  3. In fabrikam.com, run the New-FedereationTrust cmdlet.

  4. In contoso.com, run the New-FederationTrust cmdlet.

Answer: C

Question No: 122 – (Topic 6)

You have a server named Server1 that has Exchange Server 2013 installed.

Users access their mailbox by using Microsoft Outlook 2010 and Outlook Web App.

You need to identify when a mailbox is accessed by someone other than the owner of the mailbox.

Which two actions should you perform? Each correct answer presents part of the solution.

  1. Review the security event log.

  2. Enable audit logging for all mailboxes.

  3. Export the administrator audit log.

  4. Run an administrator role group report.

  5. Run a non-owner mailbox access report.

Answer: B,E Explanation:

You have to enable mailbox audit logging for each mailbox that you want to run a non- owner mailbox access report.

The Non-Owner Mailbox Access Report in the Exchange Administration Center (EAC) lists the mailboxes that have been accessed by someone other than the person who owns the mailbox. When a mailbox is accessed by a non-owner, Microsoft Exchange logs information about this action in a mailbox audit log that’s stored as an email message in a

mailbox and when, the actions performed by the non-owner, and whether the action was successful.

Reference: Run a non-owner mailbox access report https://technet.microsoft.com/en-us/library/jj150575(v=exchg.150).aspx

Question No: 123 HOTSPOT – (Topic 6)

You manage an Exchange Server 2013 organization for an investment company at which brokers are restricted from communicating with market researchers. You need to prevent members of a group named AllBrokers from using email to share confidential information with members of a group named AllResearchers. The solution must ensure that when an email message is rejected, the sender receives a custom notification of 鈥淐ommunication Not Permitted of Compliance Reasons鈥?

What command should you use? To answer, select the appropriate options in the answer area.

Hot Area

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Explanation:

Dumps4Cert 2018 PDF and VCE

This example creates a transport rule with the following condition:

Between distribution list and distribution list. The first condition property value is the distribution group Sales-Group. The second condition property value is the distribution group Brokerage-Group.

The rule also has the following exceptions:

-> With text patterns in the subject. The value for this exception is Press Release or Corporate Communication.

-> From people. The values for this exception are the users Tony Smith and Pilar Ackerman.

The following action will be applied to any messages that match the quot;Between distribution list and distribution listquot; condition, but doesn#39;t match the quot;with text patterns in the subjectquot; or quot;from peoplequot; exceptions:

-> Send reject message to sender The value for this action is: Email messages sent

between the Sales department and the Brokerage department are prohibited.

New-TransportRule quot;BlockMessagesBetweenSalesAndBrokeragequot; -BetweenMemberOf1 quot;Sales-Groupquot; -BetweenMemberOf2 quot;Brokerage-Groupquot; -ExceptIfFrom quot;Tony Smithquot;,quot;Pilar Ackermanquot; -ExceptIfSubjectContainsWords quot;Press Releasequot;,quot;Corporate Communicationquot; – RejectMessageEnhancedStatusCode quot;5.7.1quot; -RejectMessageReasonText quot;Email

Dumps4Cert 2018 PDF and VCE

Question No: 124 HOTSPOT – (Topic 6)

Your network contains two Active Directory sites named Site1 and Site2. Both sites contain an equal number of users. Each site contains two Exchange Server 2013 Mailbox servers.

You need to recommend a high-availability solution that meets the following requirements:

-> If a single Mailbox server fails, the active mailbox database copies on that server must fail over to a Mailbox server in the same site.

-> If both Mailbox servers in the same site fail, the active mailbox databases copies

must be switched over to the other site manually.

-> If a WAN link fails, multiple copies of the same mailbox database must not be activated in both sites simultaneously.

How should you configure the database availability groups (DAGs)? (To answer, configure the appropriate options in the answer area.)

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Question No: 125 – (Topic 6)

You have an Exchange Server 2013 organization that is integrated with Microsoft Lync Server 2013. Users report that they fail to make Unified Messaging (UM) calls.

You download the Unified Message Troubleshooting tool.

Which cmdlet should you use?

  1. Test-ExchangeUMCallFlow

  2. Test-CsPhoneBootstrap

  3. Start-UMPhoneSession

  4. Test-UMConnectivity

Answer: A Explanation:

Use the Test-ExchangeUMCallFlow cmdlet (the UM Troubleshooting Tool) to test call flow between Client Access servers running the Microsoft Exchange Unified Messaging Call Router service, Mailbox servers running the Microsoft Exchange Unified Messaging service, VoIP gateways, IP PBXs, Session Initiation Protocol (SIP) servers and Microsoft Lync Server. The Test-ExchangeUMCallFlow cmdlet can be used to diagnose configuration errors found in telephony components, Exchange 2010 SP1 or later or Exchange 2013 Unified Messaging settings, and connectivity issues between on-premises and hybrid Unified Messaging deployments.

Reference: Test-ExchangeUMCallFlow

https://technet.microsoft.com/en-us/library/ff630913(v=exchg.150).aspx

Question No: 126 – (Topic 6)

You have an Exchange Server 2013 Organization that has a hybrid development with Microsoft Office 365. The hybrid deployment includes an Active Directory Federation Services (AD FS) proxy server and a DirSync server.

You plan to remove the AD FS server.

You need to configure DirSync services for Single Sign-On (SSO).

Which two actions should you perform? Each correct answer presents part of the solution.

  1. Convert the Office 365 domain to federated.

  2. Convert the Office 365 domain to managed.

    Dumps4Cert 2018 PDF and VCE

  3. Enable Password synchronization.

  4. Modify the external sharing options.

  5. Enable Password write-back.

Answer: B,D

Question No: 127 – (Topic 6)

You have a hybrid deployment of Exchange Server 2013 and Microsoft Office 365. The Exchange Server organization has a mailbox size limit of 2 GB.

You need to provide engineers with the ability to retain certain email messages indefinitely. The solution must meet the following requirements:

-> Ensure that the engineers can access the retained email messages by using Outlook Web App.

-> Ensure that the retained email messages do not apply to the mailbox size limit of

the engineers.

-> Minimize the storage requirements of the on-premises servers.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. From Office 365, create Archive mailboxes.

  2. Instruct the engineers to create a personal folder.

  3. Create a retention policy.

  4. From the on-premises Exchange Server 2013 organization, create Archive mailboxes.

  5. Create a data loss prevention (DLP) policy.

Answer: A,C Explanation: C:

Dumps4Cert 2018 PDF and VCE

A:

In Exchange Server an archive mailbox is a second mailbox provisioned for a user that is separate to their primary user mailbox.

Question No: 128 – (Topic 6)

You have an Exchange Server 2010 organization.

All public folders are stored on a server named Server1.

You deploy a new server named Server2. Server2 has Exchange Server 2013 installed. You move all mailboxes to Server2.

You need to move the public folders to Server2. The solution must ensure that users can access the public folders after Server1 is decommissioned.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. On Server2, assign the FolderOwner permission to the Public Folder Management role group for all of the public folders.

  2. On Server1, modify the replication partners for all of the public folders.

  3. On Server2, run the New-SiteMailboxProvisioningPolicy cmdlet.

  4. On Server2, create a public folder mailbox.

  5. On Server2, run the New-PublicFolderMigrationRequest cmdlet.

Answer: A,E Explanation:

D: Create the public folder mailboxes on the Exchange 2013 server E: Migrate Exchange 2010 public folders

From the Exchange 2013 Mailbox server, run the following command:

New-PublicFolderMigrationRequest -SourceDatabase (Get-PublicFolderDatabase -Server

lt;Source server namegt;) -C

Reference: Use serial migration to migrate public folders to Exchange 2013 from previous versions

https://technet.microsoft.com/en-us/library/jj150486(v=exchg.150).aspx

Question No: 129 – (Topic 6)

You have an Exchange Server 2013 organization.

The human resources (HR) department has a custom form used to enter the personal information of employees. The form uses the Microsoft Word format.

You need to prevent users in the HR department from sending any completed forms to users outside of the organization.

Which two of the following should you create? Each correct answer presents part of the solution.

  1. A Send connector of the Partner type

  2. A document fingerprint

  3. A Policy Tip

Answer: A,D Explanation:

First create a document fingerprint then create a Transport Rule to take action on the fingerprinted document.

Note: Information workers in your organization handle many kinds of sensitive information during a typical day. Document Fingerprinting makes it easier for you to protect this information by identifying standard forms that are used throughout your organization.

Document Fingerprinting is a Data Loss Prevention (DLP) feature that converts a standard form into a sensitive information type, which you can use to define transport rules and DLP policies.

Reference: Protect Your IP Using Document Fingerprints

http://blogs.technet.com/b/lystavlen/archive/2014/03/04/protect-your-ip-using-document- fingerprints.aspx

Question No: 130 – (Topic 6)

You are an administrator for a company named Contoso, Ltd. Contoso has an Exchange Server 2013 organization.

Contoso has a partnership agreement with a company named A. Datum Corporation. A. Datum has an Exchange server 2013 organization.

Both organizations have a federation trust to the Microsoft Federation Gateway. Users at Contoso plan to share their free/busy information with users at A. Datum.

You need to recommend which tasks must be performed to ensure that the A. Datum users can see the free/busy information of the Contoso users.

  1. In the Exchange Server organization of Contoso, configure directory synchronization.

  2. In the Exchange Server organization of A. Datum, create a sharing policy.

  3. In the Exchange Server organization of A. Datum, configure directory synchronization.

  4. In the Exchange Server organization of Contoso, create an organization relationship.

  5. In the Exchange Server organization of Contoso, create a sharing policy.

  6. In the Exchange Server organization of A. Datum, create an organization relationship.

Answer: D,E Explanation:

Business-to-business calendar sharing is set up by creating organization relationships. User-to-user calendar sharing is set up by applying sharing policies.

There is no requirement for Contoso users to view the free/busy information of the A.Datum users. Therefore, we don’t need to create an organization relationship in A.Datum.

Configure Federated Sharing

Step 1: Create and configure a federation trust (this has already been done here)

Step 2 (D): Create an organization relationship

An organization relationship enables users in your Exchange organization to share calendar free/busy information as part of federated sharing with other federated Exchange organizations.

Step 3 (E): Create a sharing policy

Sharing policies enable user-established, people-to-people sharing of both calendar and contact information with different types of external users. They support the sharing of calendar and contact information with external federated organizations, external non- federated organizations, and individuals with Internet access. If you don’t need to configure people-to-people or contact sharing (organization-level sharing only), you don’t need to configure a sharing policy.

Step 4: Configure an Autodiscover public DNS record

Note:

With federated sharing, users in your on-premises Exchange organization can share free/busy calendar information with recipients in other Exchange organizations that are also configured for federated sharing. Free/busy sharing can be enabled between two organizations running Exchange 2013 and also between organizations with a mixed

Dumps4Cert 2018 PDF and VCE

100% Dumps4cert Free Download!
Download Free Demo:70-342 Demo PDF
100% Dumps4cert Pass Guaranteed!
Download 2018 Dumps4cert 70-342 Full Exam PDF and VCE

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No


Leave a Reply

Your email address will not be published. Required fields are marked *

  • Categories

  • Tags

  • Hot Exams

  • Hot Exams

  • Hot Catageories

  • microsoft dumps

    62-193 Dumps
    70-243 Dumps
    70-246 Dumps
    70-247 Dumps
    70-331 Dumps
    70-332 Dumps
    70-333 Dumps
    70-334 Dumps
    70-339 Dumps
    70-341 Dumps
    70-342 Dumps
    70-345 Dumps
    70-346 Dumps
    70-347 Dumps
    70-348 Dumps
    70-354 Dumps
    70-355 Dumps
    70-357 Dumps
    70-383 Dumps
    70-384 Dumps
    70-385 Dumps
    70-398 Dumps
    70-410 Dumps
    70-411 Dumps
    70-412 Dumps
    70-413 Dumps
    70-414 Dumps
    70-417 Dumps
    70-461 Dumps
    70-462 Dumps
    70-463 Dumps
    70-464 Dumps
    70-465 Dumps
    70-466 Dumps
    70-467 Dumps
    70-469 Dumps
    70-470 Dumps
    70-473 Dumps
    70-475 Dumps
    70-480 Dumps
    70-481 Dumps
    70-482 Dumps
    70-483 Dumps
    70-484 Dumps
    70-485 Dumps
    70-486 Dumps
    70-487 Dumps
    70-488 Dumps
    70-489 Dumps
    70-490 Dumps
    70-491 Dumps
    70-492 Dumps
    70-494 Dumps
    70-496 Dumps
    70-497 Dumps
    70-498 Dumps
    70-499 Dumps
    70-517 Dumps
    70-532 Dumps
    70-533 Dumps
    70-534 Dumps
    70-535 Dumps
    70-537 Dumps
    70-640 Dumps
    70-642 Dumps
    70-646 Dumps
    70-673 Dumps
    70-680 Dumps
    70-681 Dumps
    70-682 Dumps
    70-684 Dumps
    70-685 Dumps
    70-686 Dumps
    70-687 Dumps
    70-688 Dumps
    70-689 Dumps
    70-692 Dumps
    70-694 Dumps
    70-695 Dumps
    70-696 Dumps
    70-697 Dumps
    70-698 Dumps
    70-703 Dumps
    70-705 Dumps
    70-713 Dumps
    70-734 Dumps
    70-735 Dumps
    70-740 Dumps
    70-741 Dumps
    70-742 Dumps
    70-743 Dumps
    70-744 Dumps
    70-745 Dumps
    70-761 Dumps
    70-762 Dumps
    70-764 Dumps
    70-765 Dumps
    70-767 Dumps
    70-768 Dumps
    70-773 Dumps
    70-774 Dumps
    70-775 Dumps
    70-776 Dumps
    70-778 Dumps
    70-779 Dumps
    70-980 Dumps
    70-981 Dumps
    70-982 Dumps
    74-343 Dumps
    74-344 Dumps
    74-409 Dumps
    74-678 Dumps
    74-697 Dumps
    77-418 Dumps
    77-419 Dumps
    77-420 Dumps
    77-421 Dumps
    77-422 Dumps
    77-423 Dumps
    77-424 Dumps
    77-425 Dumps
    77-426 Dumps
    77-427 Dumps
    77-428 Dumps
    77-600 Dumps
    77-601 Dumps
    77-602 Dumps
    77-603 Dumps
    77-604 Dumps
    77-605 Dumps
    77-725 Dumps
    77-726 Dumps
    77-727 Dumps
    77-728 Dumps
    77-729 Dumps
    77-730 Dumps
    77-731 Dumps
    77-853 Dumps
    77-881 Dumps
    77-882 Dumps
    77-883 Dumps
    77-884 Dumps
    77-885 Dumps
    77-886 Dumps
    77-887 Dumps
    77-888 Dumps
    77-891 Dumps
    98-349 Dumps
    98-361 Dumps
    98-362 Dumps
    98-363 Dumps
    98-364 Dumps
    98-365 Dumps
    98-366 Dumps
    98-367 Dumps
    98-368 Dumps
    98-369 Dumps
    98-372 Dumps
    98-373 Dumps
    98-374 Dumps
    98-375 Dumps
    98-379 Dumps
    98-380 Dumps
    98-381 Dumps
    98-382 Dumps
    98-383 Dumps
    98-388 Dumps
    AZ-100 Dumps
    AZ-101 Dumps
    AZ-102 Dumps
    INF-203x Dumps
    INF-204x Dumps
    INF-205x Dumps
    INF-206x Dumps
    MB2-700 Dumps
    MB2-701 Dumps
    MB2-702 Dumps
    MB2-703 Dumps
    MB2-704 Dumps
    MB2-706 Dumps
    MB2-707 Dumps
    MB2-708 Dumps
    MB2-709 Dumps
    MB2-710 Dumps
    MB2-711 Dumps
    MB2-712 Dumps
    MB2-713 Dumps
    MB2-714 Dumps
    MB2-715 Dumps
    MB2-716 Dumps
    MB2-717 Dumps
    MB2-718 Dumps
    MB2-719 Dumps
    MB2-877 Dumps
    MB5-705 Dumps
    MB6-700 Dumps
    MB6-701 Dumps
    MB6-702 Dumps
    MB6-703 Dumps
    MB6-704 Dumps
    MB6-705 Dumps
    MB6-884 Dumps
    MB6-885 Dumps
    MB6-886 Dumps
    MB6-889 Dumps
    MB6-890 Dumps
    MB6-892 Dumps
    MB6-893 Dumps
    MB6-894 Dumps
    MB6-895 Dumps
    MB6-896 Dumps
    MB6-897 Dumps
    MB6-898 Dumps